SlideShare une entreprise Scribd logo
1  sur  11
Network security
Submited to : Dinesh kumar choudhary
Submited by : Rikvendra singh Rajawat
What is Network ?
network is a collection of computers and devices
connected by communications channels that
facilitates communications among users and allows
users to share resources with other users
. Types of Networks Local Area Network
(LAN) Wide Area Network (WAN) Metropolitan Area
Network (MAN)
What is Network Security ?
 Network security defined Network security is a broad
term that covers a multitude of technologies,
devices and processes. In its simplest term, it is a
set of rules and configurations designed to protect
the integrity, confidentiality and accessibility of
computer networks and data using both software and
hardware technologies.
Why we need to secure ?
 Protect vital information while still allowing
access to those who need it Trade secrets,
medical records, etc.
 Provide authentication and access control for
resources
 Guarantee availability of resources
Hackers

Hacker someone who attempts to break into
computer systems to damage it, or for the purpose
of getting illegitimate access to resources
Cryptography
 Cryptography
Cryptography is the science of concealing the
meaning of a message from unintended
recipients Only the intended recipient is able to
read and understand the message
Network viruses
 Network viruses
A network virus is a self-contained program (or
set of programs) that can spread copies of itself
across networks, including the Internet.
 In many cases, network viruses exploit
vulnerabilities in the operating system or other
installed programs. and they can use legitimate
network ports, such as port 80 (HTTP) and Local
Area Network (LAN) or even over the Internet to
spread. Some of the most famous network
viruses are Nimda and SQLSlammer .
 Nimba , I love you ,
Wireless Network Security
 The "open air" nature of wireless radio signals
posses challenges for securing wireless computer
networks.
 Security features like
1. WEP
2. WPA
3. MAC
WEP (Wired Equivalent Privacy )
 WEP (Wired Equivalent Privacy 128-bit)WEP is an OSI Data Link layer (Layer 2)
security
technology that can be turned "on" or "off.
 WEP was designed to give wireless networks the
equivalent level of privacy protection .
Access Control
 Host-to-Host Authentication. users authenticate
themselves once to a host computer. That computer
then authenticates itself to other computers.
 Authentication Servers. the users authenticate
themselves to the authentication server. This
computer then authenticates the user to other
host computers
 User-to-Host requires the user to log-in to each
host computer.
Access Control
 Host-to-Host Authentication. users authenticate
themselves once to a host computer. That computer
then authenticates itself to other computers.
 Authentication Servers. the users authenticate
themselves to the authentication server. This
computer then authenticates the user to other
host computers
 User-to-Host requires the user to log-in to each
host computer.

Contenu connexe

Similaire à Network security.pptx

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
Anand Kater
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
AfiqEfendy Zaen
 

Similaire à Network security.pptx (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
Network Security
Network SecurityNetwork Security
Network Security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
G011123539
G011123539G011123539
G011123539
 
Network security
Network securityNetwork security
Network security
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
Communication security
Communication securityCommunication security
Communication security
 
Social Engg. Assignment it17 final (1)
Social Engg. Assignment  it17 final (1)Social Engg. Assignment  it17 final (1)
Social Engg. Assignment it17 final (1)
 
Network security
Network security Network security
Network security
 
internet security
internet securityinternet security
internet security
 
Data security
Data securityData security
Data security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Network security
Network securityNetwork security
Network security
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Network security.pptx

  • 1. Network security Submited to : Dinesh kumar choudhary Submited by : Rikvendra singh Rajawat
  • 2. What is Network ? network is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users . Types of Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
  • 3. What is Network Security ?  Network security defined Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
  • 4. Why we need to secure ?  Protect vital information while still allowing access to those who need it Trade secrets, medical records, etc.  Provide authentication and access control for resources  Guarantee availability of resources
  • 5. Hackers  Hacker someone who attempts to break into computer systems to damage it, or for the purpose of getting illegitimate access to resources
  • 6. Cryptography  Cryptography Cryptography is the science of concealing the meaning of a message from unintended recipients Only the intended recipient is able to read and understand the message
  • 7. Network viruses  Network viruses A network virus is a self-contained program (or set of programs) that can spread copies of itself across networks, including the Internet.  In many cases, network viruses exploit vulnerabilities in the operating system or other installed programs. and they can use legitimate network ports, such as port 80 (HTTP) and Local Area Network (LAN) or even over the Internet to spread. Some of the most famous network viruses are Nimda and SQLSlammer .  Nimba , I love you ,
  • 8. Wireless Network Security  The "open air" nature of wireless radio signals posses challenges for securing wireless computer networks.  Security features like 1. WEP 2. WPA 3. MAC
  • 9. WEP (Wired Equivalent Privacy )  WEP (Wired Equivalent Privacy 128-bit)WEP is an OSI Data Link layer (Layer 2) security technology that can be turned "on" or "off.  WEP was designed to give wireless networks the equivalent level of privacy protection .
  • 10. Access Control  Host-to-Host Authentication. users authenticate themselves once to a host computer. That computer then authenticates itself to other computers.  Authentication Servers. the users authenticate themselves to the authentication server. This computer then authenticates the user to other host computers  User-to-Host requires the user to log-in to each host computer.
  • 11. Access Control  Host-to-Host Authentication. users authenticate themselves once to a host computer. That computer then authenticates itself to other computers.  Authentication Servers. the users authenticate themselves to the authentication server. This computer then authenticates the user to other host computers  User-to-Host requires the user to log-in to each host computer.